摘要:
It is presented a method for transferring receiving of streaming content from a first media receiver (12a) to a second media receiver (12b), the method comprising the steps, executed in a streaming transfer server (10), of : receiving a presence message (22) indicating the presence of the second media receiver (12b); receiving an in use message (24) indicating that the first media receiver (12a) is in active use by the user (2); transmitting a present media receiver message (26) to the first media receiver (12a), the present media receiver message (26) comprising an identifier of the second media receiver (12b); receiving a transfer message (32) indicating that the receiving of the streaming content should be transferred from the first media receiver (12a) to the second media receiver (12b); obtaining an identifier of the streaming content (34); and transmitting an initiate content message (33) to the second media receiver (12b), wherein the initiate content message (33) comprises the identifier of the streaming content.
摘要:
A method of operating a proxy to facilitate performing a transaction between a client device and a merchant system, the method comprising the proxy: receiving first transaction data from the client device; receiving first transaction data from the merchant system; forwarding first transaction data received from the client device to the merchant system; forwarding first transaction data received from the merchant system to the client device; identifying that a particular stage of the transaction has been reached, the particular stage to involve a transfer of second transaction data between the client device and a particular system; and in response to identifying that the particular stage of the transaction has been reached, indicating to the client device that second transaction data should be transferred directly between the client device and the particular system.
摘要:
An Ad Hoc social networking environment enables information and device access management between social networking groups and social networking members with or without access restrictions and anonymity. Contact and access information can be exchanged and updated on the fly without requiring users to notify other contacts or contacting devices and can support underlying contact information changes, enable extemporaneous termination or modification of contact access, enable temporary access, and the like. Ad Hoc social networking can utilize unique identifiers, proxy elements, or the like to support various levels of membership anonymity and Ad Hoc social networking. Proxy elements enable SNET tear down or dissolution by retracting the proxy service from a member. Storing social group contact information in shared databases can enable sharing and updating of contact information without the need to inform affected contacts. Some social networks can include various specialized devices and related services.
摘要翻译:Ad Hoc社交网络环境可以实现社交网络组和社交网络成员之间的信息和设备访问管理,无论是否具有访问限制和匿名性。 联系和访问信息可以即时交换和更新,而不需要用户通知其他联系人或联系设备,并且可以支持底层的联系人信息更改,使得临时终止或修改联系人访问,启用临时访问等。 Ad Hoc社交网络可以利用独特的标识符,代理元素等来支持各种会员匿名和Ad Hoc社交网络。 代理元素使SNET通过从成员撤回代理服务来拆除或解散。 将社群组联系信息存储在共享数据库中可以实现共享和更新联系信息,而无需通知受影响的联系人。 一些社交网络可以包括各种专门的设备和相关的服务。
摘要:
It is presented a method for invoking an application service in response to a tag reading by a mobile terminal. The method comprises the steps of: receiving an input message, the input message comprising data being associated with a tag read by the mobile terminal using local communication, the input message further comprising a recipient identifier linked to the mobile terminal; determining, using a plurality of parameters associated with the tag reading, a plurality of matching application servers, wherein conditions of a tag reading subscription for each of the matching application servers matches the plurality of parameters; and sending an invocation message to each of the matching application servers to invoke a respective application service of each of the matching application servers, the invocation message comprising the recipient identifier enabling each of the application services to send content to the user equipment and the tag data.
摘要:
A method for providing access to a computing environment includes the step of receiving, by a broker machine, a request from a client machine for access to a computing environment, the request including an identification of a user of the client machine. One of a plurality of virtual machines is identified, the identified virtual machine providing the requested computing environment. One of a plurality of execution machines is identified, the identified execution machine executing a hypervisor providing access to hardware resources required by the identified virtual machine. A connection is established between the client machine and the identified virtual machine.
摘要:
Systems and methods are provided for protocol mapping. According to an embodiment of the application, the protocol mapping is based on a non-compiled editable file (e.g. XML file) that describes the protocol mapping. Therefore, the protocol mapping can be updated by updating the non-compiled editable file without updating any compiled software. This allows the protocol mapping to be updated to reflect any changes to communication protocols that may occur without having to update any compiled software. Difficulties traditionally associated with updating protocol mappings can be avoided by not having to update compiled software.
摘要:
The present invention provides methods and apparatuses for obtaining selected metadata from a user device. The user device has a metadata engine that stores and accesses metadata in response to a metadata query. A metadata broker verifies the authenticity of the metadata query from a service provider and returns selected metadata if the service provider has rights to obtain the metadata. The user device has a communications interface that sends a service request that is indicative of the selected service over a communications channel and receives the metadata request that is indicative of the selected metadata. An authorization center receives a metadata request from a service provider, accesses a rule set to determine selected metadata in accordance with predetermined rights, and returns a signed metadata request to the service provider. The signed metadata request has an electronic signature of an authorizing party and is indicative of the selected metadata.